US10854028B2 - Authentication for keyless building entry - Google Patents
Authentication for keyless building entry Download PDFInfo
- Publication number
- US10854028B2 US10854028B2 US15/232,720 US201615232720A US10854028B2 US 10854028 B2 US10854028 B2 US 10854028B2 US 201615232720 A US201615232720 A US 201615232720A US 10854028 B2 US10854028 B2 US 10854028B2
- Authority
- US
- United States
- Prior art keywords
- person
- biometric identifiers
- building
- devices
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims abstract description 65
- 238000004891 communication Methods 0.000 claims description 30
- 230000006854 communication Effects 0.000 claims description 30
- 238000005516 engineering process Methods 0.000 claims description 23
- 230000001815 facial effect Effects 0.000 claims description 18
- 210000001525 retina Anatomy 0.000 claims description 10
- 230000006870 function Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 13
- 230000004888 barrier function Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 230000033001 locomotion Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 239000002245 particle Substances 0.000 description 2
- UGFAIRIUMAVXCW-UHFFFAOYSA-N Carbon monoxide Chemical compound [O+]#[C-] UGFAIRIUMAVXCW-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 229910002091 carbon monoxide Inorganic materials 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- -1 light Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/04—Access control involving a hierarchy in access rights
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
- G07C2209/64—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor
Definitions
- the present disclosure for example, relates to security and/or automation systems, and more particularly to authenticating persons for purposes of keyless building entry using a security and/or automation system.
- Security and automation systems are widely deployed to provide various types of communication and functional features such as monitoring, communication, notification, and/or others. These systems may be capable of supporting communication with a user through a communication connection or a system management action.
- Home automation and security products can fully automate aspects of a residence and/or business.
- home automation and security products may use biometric identifiers among other device identifiers to unlock and/or automatically open a door to a building.
- Most doors require one or more keys to unlock and permit entry of a person into the building.
- Some doors may be more sophisticated and use a key code, scan card, or other form of entry. However, scan cards and keys may be lost and key codes may be forgotten. Further, handling cards and keys and entering key codes may be difficult in some situations, such as when the user's hands are full.
- the present disclosure is directed to systems and methods for authenticating persons as part of granting access to a building or property.
- the authenticating may be conducted in a way that eliminates the need for a key, card or other device that must be manually operated by the person to gain access to the building or property.
- the authenticating may include two or more authenticating steps and/or inputs.
- the authenticating may include one or more biometric identifiers, such as facial recognition, voice recognition, thumbprint, fingerprint, palm print, and retina scan.
- the authenticating may include identification of an electronic device carried by or in some way associated with the person attempting to gain access to the building or property.
- the electronic device may include, for example, a smart phone, a fab, an access card, a tablet computer, or the like.
- the authenticating may also include identifying the presence of the person at an access point to the building or property.
- the presence may be identified in a number of ways, including motion detection, facial recognition or collection of other biometric identifiers, or presence of a computing device.
- the system may include a database of registered users of the property who have been granted various access rights and/or permissions. Information about at least one of the detected biometric identifiers and/or detected devices may be checked against information in the database to determine whether the person should be granted access to the building or property.
- a computer-implemented method for controlling access to a building associated with a security and/or automation system includes detecting a presence of at least one person positioned proximate an entry to the building, collecting one or more biometric identifiers from the at least one person, identifying one or more devices within a predetermined proximity of the entry to the building, and granting the person access to the building based at least in part on the collecting and the identifying.
- the method further includes creating a user profile, wherein the user profile comprises at least one biometric identifier and one device.
- the method may include searching a user profile database based at least in part on the collecting and identifying, and locating the user profile that matches the one or more biometric identifiers and the one or more devices.
- the method may include determining a level of access to the building based at least in part on the locating.
- the method may include denying access to the building based at least in part on the determining.
- the one or more biometric identifiers may include at least one of facial recognition, voice recognition, thumbprint, fingerprint, palm print, and retina scan. Identifying one or more devices may include using at least one of WiFi, radio frequency identification (RFID), geo location, and BLUETOOTH® technology. The identifying may occur before the collecting.
- the collecting may include collecting at least two biometric identifiers. The collecting may be performed with at least one device positioned proximate a doorbell of the building. Granting the person access to the building may include at least one of unlocking a door and opening a door.
- Another embodiment is directed to an apparatus for controlling access to a building associated with a security and/or automation system.
- the apparatus includes a processor, memory in electronic communication with the processor, and instructions stored in the memory.
- the instructions are executable by the processor to collect one or more biometric identifiers from a person positioned at an entry to the building, identify one or more devices carried by the person, and grant the person access to the building based at least in part on the collected one or more biometric identifiers and the identified one or more devices.
- the instructions may be executable by the processor to collect the one or more biometric identifiers using at least one of a camera, a scanner, and a microphone.
- the instructions may be executable by the processor to identify one of more devices using at least one of WiFi, radio frequency identification (RFID), geo location, and BLUETOOTH® signals.
- the one or more biometric identifiers may include at least one of facial recognition, voice recognition, thumbprint, fingerprint, palm print, and retina scan.
- the instructions may be executable by the processor to collect one or more biometric identifiers before identifying one or more devices.
- the instructions may be executable by the processor to collect one or more biometric identifiers after identifying one or more devices.
- the instructions may be executable by the processor to detect presence of the person before collecting the one or more biometric identifiers.
- a further embodiment is directed to a non-transitory computer-readable medium storing computer-executable code for controlling access to a building associated with a security and/or automation system.
- the code is executable by a processor to detect a presence of at least one person positioned proximate an entry to the building, collect one or more biometric identifiers from the at least one person, identify one or more devices within a predetermined proximity of the entry to the building, and grant the person access to the building based at least in part on the collecting and the identifying.
- the code may be executable by a processor to detect the presence concurrently with collecting one or more biometric identifiers.
- FIG. 1 is a block diagram of an example of a security and/or automation system in accordance with various embodiments
- FIG. 2 shows a block diagram of a device relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 3 shows a block diagram of a device relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 4 shows a block diagram relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 5 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 6 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 7 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 8 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 9 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure.
- FIG. 10 shows a block diagram of an authentication apparatus relating to a security and/or an automation system, in accordance with various aspects of this disclosure
- FIG. 11 is a flow chart illustrating an example of a method relating to a security and/or an automation system, in accordance with various aspects of this disclosure.
- FIG. 12 is a flow chart illustrating an example of a method relating to a security and/or an automation system, in accordance with various aspects of this disclosure.
- the present disclosure relates to systems and methods for keyless authentication to a building using, for example, either one of or a combination of biometric identifiers and device recognition.
- a security and/or automation system may be equipped to recognize one or more biometric identifiers and use those biometric identifiers to provide access to a building or property.
- the biometric identifiers may comprise, for example, facial recognition, voice recognition, thumbprint, fingerprint, palm print, retina or iris recognition, and similar human characteristics and traits.
- the automation system may be equipped with a specific imagine capturing system to identify set biometric identifiers or a scanning technology to recognize a separate set of biometric identifiers.
- the image capturing system may be proximate one or more entries to a building and may be visible and/or hidden.
- the image capturing system may be integrated with a doorbell device of a building.
- a light or other visual indicator, speaker or display screen may provide communications to a user as part of collecting the biometric identifier (e.g., communication that the image capturing system is functioning and the user may stand appropriately to allow the image capturing system to recognize a biometric identifier of the person).
- the automation system may additionally be equipped to detect one or more electronic devices associated with (e.g., carried by) the user.
- the electronic devices may comprise, for example, a mobile key, a key fab, a mobile computing device (e.g., smart phone), a mobile security hardware device, and the like.
- the automation system may detect when the device is within a predetermined distance of the geographic coverage area serviced by the automation system. For example, the device may be able to connect to a wireless network associated with the automation system and/or building/property. The automation system may recognize a unique identifier of the device.
- the automation system may unlock and/or automatically open a barrier to the building or grounds upon recognition of one or more identifying features.
- the automation system may be programmed with users and user profiles.
- the user profiles may define the level of access to a building and determine identifying characteristics to positively identify the user and grant the user access to the building.
- more than one identifying characteristic may be required.
- the automation system may have multiple identifying characteristics and may need to recognize at least two characteristics to ensure a positive identification for authentication purposes.
- FIG. 1 is an example of a communications system 100 in accordance with various aspects of the disclosure.
- the communications system 100 may include one or more sensor units 110 , local computing device 115 , 120 , network 125 , server 130 , control panel 135 , and remote computing device 140 .
- One or more sensor units 110 may communicate via wired or wireless communication links 145 with one or more of the local computing device 115 , 120 or network 125 .
- the network 125 may communicate via wired or wireless communication links 145 with the control panel 135 and the remote computing device 140 via server 130 .
- the network 125 may be integrated with any one of the local computing device 115 , 120 , server 130 , or remote computing device 140 , such that separate components are not required.
- Local computing device 115 , 120 and remote computing device 140 may be custom computing entities configured to interact with sensor units 110 via network 125 , and in some embodiments, via server 130 .
- local computing device 115 , 120 and remote computing device 140 may be general purpose computing entities such as a personal computing device, for example, a desktop computer, a laptop computer, a netbook, a tablet personal computer (PC), a control panel, an indicator panel, a multi-site dashboard, an iPod®, an iPad®, a smart phone, a mobile phone, a personal digital assistant (PDA), and/or any other suitable device operable to send and receive signals, store and retrieve data, and/or execute modules.
- a personal computing device for example, a desktop computer, a laptop computer, a netbook, a tablet personal computer (PC), a control panel, an indicator panel, a multi-site dashboard, an iPod®, an iPad®, a smart phone, a mobile phone, a personal digital assistant (PDA), and/or any other suitable device operable to send and
- Control panel 135 may be a smart home system panel, for example, an interactive panel mounted on a wall in a user's home. Control panel 135 may be in direct communication via wired or wireless communication links 145 with the one or more sensor units 110 , or may receive sensor data from the one or more sensor units 110 via local computing devices 115 , 120 and network 125 , or may receive data via remote computing device 140 , server 130 , and network 125 .
- the local computing devices 115 , 120 may include memory, a processor, an output, a data input and a communication module.
- the processor may be a general purpose processor, a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), and/or the like.
- the processor may be configured to retrieve data from and/or write data to the memory.
- the memory may be, for example, a random access memory (RAM), a memory buffer, a hard drive, a database, an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), a read only memory (ROM), a flash memory, a hard disk, a floppy disk, cloud storage, and/or so forth.
- the local computing devices 115 , 120 may include one or more hardware-based modules (e.g., DSP, FPGA, ASIC) and/or software-based modules (e.g., a module of computer code stored at the memory and executed at the processor, a set of processor-readable instructions that may be stored at the memory and executed at the processor) associated with executing an application, such as, for example, receiving and displaying data from sensor units 110 .
- hardware-based modules e.g., DSP, FPGA, ASIC
- software-based modules e.g., a module of computer code stored at the memory and executed at the processor, a set of processor-readable instructions that may be stored at the memory and executed at the processor
- the processor of the local computing devices 115 , 120 may be operable to control operation of the output of the local computing devices 115 , 120 .
- the output may be a television, a liquid crystal display (LCD) monitor, a cathode ray tube (CRT) monitor, speaker, tactile output device, and/or the like.
- the output may be an integral component of the local computing devices 115 , 120 .
- the output may be directly coupled to the processor.
- the output may be the integral display of a tablet and/or smart phone.
- an output module may include, for example, a High Definition Multimedia InterfaceTM (HDMI) connector, a Video Graphics Array (VGA) connector, a Universal Serial BusTM (USB) connector, a tip, ring, sleeve (TRS) connector, and/or any other suitable connector operable to couple the local computing devices 115 , 120 to the output.
- HDMI High Definition Multimedia Interface
- VGA Video Graphics Array
- USB Universal Serial BusTM
- TRS sleeve
- the remote computing device 140 may be a computing entity operable to enable a remote user to monitor the output of the sensor units 110 .
- the remote computing device 140 may be functionally and/or structurally similar to the local computing devices 115 , 120 and may be operable to receive data streams from and/or send signals to at least one of the sensor units 110 via the network 125 .
- the network 125 may be the Internet, an intranet, a personal area network, a local area network (LAN), a wide area network (WAN), a virtual network, a telecommunications network implemented as a wired network and/or wireless network, etc.
- the remote computing device 140 may receive and/or send signals over the network 125 via communication links 145 and server 130 .
- the one or more sensor units 110 may be sensors configured to conduct periodic or ongoing automatic measurements related to at least one of collecting biometric identifiers and detection of one or more electronic devices.
- Each sensor unit 110 may be capable of sensing multiple biometric identifiers and/or electronic devices, or alternatively, separate sensor units 110 may monitor separate biometric identifier parameters and/or electronic devices.
- one sensor unit 110 may measure one or more biometric identifiers, while another sensor unit 110 (or, in some embodiments, the same sensor unit 110 ) may detect one or more electronic devices.
- one or more sensor units 110 may additionally monitor alternate parameters, such as presence of one or more persons (e.g., persons located at or approaching an entry to a building or property).
- Sensor units 110 may monitor a variety of biometric identifiers such as facial recognition, voice recognition, thumbprint, fingerprint, palm print, retina or iris recognition, blood type, and the like.
- a user may input biometric identifier data directly at the local computing device 115 , 120 or at remote computing device 140 .
- a user may enter fingerprint data into a dedicated application on his smart phone or a scanner located at the entry to the building or property.
- Sensor units 110 may detect one or more electronic devices using various technologies, such as at least one of WiFi, radio frequency identification (RFID), geo location, BLUETOOTH® technology, and the like.
- a user may input device identification data directly at the local computing device 115 , 120 or at remote computing device 140 .
- a user may manually initiate transmission of a signal or message from an electronic device to a receiving device that is located at the entry to the building or property.
- Data gathered by the one or more sensor units 110 may be communicated to local computing device 115 , 120 , which may be, in some embodiments, a wall-mounted input/output smart home display located at the entry to the building or property.
- local computing device 115 , 120 may be a personal computer or smart phone.
- the local computing device 115 , 120 may include a doorbell, a microphone, a speaker, a camera (e.g., video camera), or components of an intercom system.
- local computing device 115 , 120 is a smart phone
- the smart phone may have a dedicated application directed to collecting biometric identifier data and/or electronic device identification data, and determining therefrom whether to grant access to the person.
- the local computing device 115 , 120 may process the data received from the one or more sensor units 110 to obtain authentication of the person.
- control panel 135 and/or remote computing device 140 may process the data received from the one or more sensor units 110 , via network 125 and/or server 130 , to obtain authentication information and determine what rights (e.g., access rights) to grant the person.
- Data transmission may occur via, for example, frequencies appropriate for a personal area network (such as BLUETOOTH® or IR communications) or local or wide area network frequencies such as radio frequencies specified by the IEEE 802.15.4 standard.
- local computing device 115 , 120 may communicate with remote computing device 140 or control panel 135 via network 125 and server 130 .
- networks 125 include cloud networks, local area networks (LAN), wide area networks (WAN), virtual private networks (VPN), wireless networks (using 802.11, for example), and/or cellular networks (using 3G and/or LTE, for example), etc.
- the network 125 may include the Internet.
- a user may access the functions of local computing device 115 , 120 from remote computing device 140 .
- remote computing device 140 may include a mobile application that interfaces with one or more functions of local computing device 115 , 120 .
- the server 130 may be configured to communicate with the sensor units 110 , the local computing devices 115 , 120 , the remote computing device 140 and control panel 135 .
- the server 130 may perform additional processing on signals received from the sensor units 110 or local computing devices 115 , 120 , or may simply forward the received information to the remote computing device 140 and control panel 135 .
- Server 130 may be a computing device operable to receive data streams (e.g., from sensor units 110 and/or local computing device 115 , 120 or remote computing device 140 ), store and/or process data, and/or transmit data and/or data summaries (e.g., to remote computing device 140 ).
- server 130 may receive a stream of biometric identifier data from a sensor unit 110 , a stream of device identifier data from the same or a different sensor unit 110 , and a stream of presence data from either the same or yet another sensor unit 110 .
- server 130 may “pull” the data streams, e.g., by querying the sensor units 110 , the local computing devices 115 , 120 , and/or the control panel 135 .
- the data streams may be “pushed” from the sensor units 110 and/or the local computing devices 115 , 120 to the server 130 .
- the sensor units 110 and/or the local computing device 115 , 120 may be configured to transmit data as it is generated by or entered into that device.
- the sensor units 110 and/or the local computing devices 115 , 120 may periodically transmit data (e.g., as a block of data or as one or more data points).
- the server 130 may include a database (e.g., in memory) containing biometric identifier data and/or device identification data received from the sensor units 110 and/or the local computing devices 115 , 120 .
- the server 130 may include a database (e.g., in memory) containing user profiles for those persons who have permission to access the building or property.
- the user profiles may include biometric identifiers and/or electronic device information that the system can use as part of the authenticating process and determining what rights to grant a particular person.
- software e.g., stored in memory
- Such software may be operable to cause the server 130 to monitor, process, summarize, present, and/or send a signal associated with resource usage data.
- FIG. 2 shows a block diagram 200 of an entry apparatus 205 for use in electronic communication, in accordance with various aspects of this disclosure.
- the entry apparatus 205 may be an example of one or more aspects of a local computing device 115 , 120 , a remote computing device 140 , or a control panel 135 described with reference to FIG. 1 .
- the entry apparatus 205 is located at an entry to a building or property.
- the entry apparatus 205 may include features and/or functionality that facilitate interactions with one or more persons who approach the entry.
- the entry apparatus 205 may include a receiver module 210 , an authentication module 215 , and/or a transmitter module 220 .
- the entry apparatus 205 may also be or include a processor. Each of these modules may be in communication with each other—directly and/or indirectly.
- the components of the entry apparatus 205 may, individually or collectively, be implemented using one or more application-specific integrated circuits (ASICs) adapted to perform some or all of the applicable functions in hardware. Alternatively, the functions may be performed by one or more other processing units (or cores), on one or more integrated circuits. In other examples, other types of integrated circuits may be used (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays (FPGAs), and other Semi-Custom ICs), which may be programmed in any manner known in the art.
- the functions of each module may also be implemented—in whole or in part—with instructions embodied in memory formatted to be executed by one or more general and/or application-specific processors.
- the receiver module 210 may receive information such as packets, user data, and/or control information associated with various information channels (e.g., control channels, data channels, etc.).
- the receiver module 210 may be configured to receive data related to biometric identifiers, electronic device identification, and/or presence of one or more persons.
- the received information may be transmitted to the authentication module 215 , and to other components of the entry apparatus 205 .
- the authentication module 215 may operate to authenticate and/or confirm identity of one or more persons attempting to gain access to a building or property.
- the authentication process may involve evaluating and/or utilizing various types of input.
- One such input may include biometric identifiers related to the person.
- Another input may include identification of one or more electronic devices associated with the person.
- a still further input may relate to recognition of the presence of the person within a predetermined area such as approaching or in close proximity to an entrance to the building or property.
- Wi-Fi radio frequency identification
- RFID radio frequency identification
- geo location e.g., a location
- BLUETOOTH® e.g., a location
- BLUETOOTH® e.g., a location
- Wi-Fi wireless fidelity
- authentication module 215 may identify when the electronic device links with a Wi-Fi system of the building or property, which may indicate that the electronic device is within a predetermined zone or geographic range of the Wi-Fi modem.
- RFID an RFID signal of the device may be identified, which typically also indicates relative close proximity to an RFID transceiver of the building or property.
- the electronic device may emit a GPS signal, and an identified geo location signal within a predetermined range of the building or property may indicate that the person at the building entry possesses the electronic device.
- BLUETOOTH® technology may have similar ability to determine location of the electronic device within a relatively small geographic zone (e.g. within a 10 ft. to 20 ft. range of a BLUETOOTH® receiver located at the building entry).
- the detecting device may be integral with the entry apparatus 205 . In other examples, the detecting apparatus may be located at other locations within the building or property (e.g., at a control panel 135 or separate local computing device 115 , 120 ).
- Authentication module 215 may also obtain information indicating the presence of a person in proximity to, for example, an entry of the building or property.
- the proximity information may be received from, for example, a motion detector, facial recognition detector, image recognition device, or the like.
- the person's presence may be identified concurrently with or using a similar technology to obtaining biometric identifiers and/or identifying an electronic device of the person.
- the system may grant access to the building or property (e.g., unlocking or otherwise opening barrier such as a door).
- the person may be able to automatically obtain access to the building or property without having to use a key or other manual access device.
- the barrier e.g., door
- Authentication module 215 may provide instructions for permitting access to the person.
- the instructions may include, for example, an unlock signal sent to a locking device of a door and/or an open signal sent to an opening device of the door.
- authentication module 215 authenticates a person using at least one biometric identifier, identification of at least one electronic device associated with the person, and confirmation of presence of the person.
- the order in which the information is collected and processed by authentication module 215 may vary. For example, an electronic device may be identified followed by confirmation that the person associated with the device is the actual person by evaluating one or more biometric identifiers of the person.
- the biometric identifiers may vary depending on available technologies and desired level of participation by the person. For example, in some embodiments the person may be required to look into a scanner, place a hand or finger on a scanning surface, or stand at a predetermined location relative to a camera in order to collect the desired biometric identifiers. In other embodiments, the authentication module 215 operates to automatically obtain the desired biometric information without knowledge and/or specified participation by the person. Similarly, the identification of one or more electronic devices of the person may be based at least in part on the person's participation in the identification process. For example, the person may be required to position his/her electronic device within a predetermined area or zone, respond to a message, generate a signal, or the like.
- authentication module 215 may operate to automatically obtain the desired device identification information via, for example, a scan, an active handshake that occurs automatically, or confirming with an operation system that a link has occurred between the electronic device and another electronic devices (e.g., a Wi-Fi modem, BLUETOOTH® receiver, geo location device, or the like) without requiring the person's knowledge or active participation.
- a scan e.g., a scan, an active handshake that occurs automatically, or confirming with an operation system that a link has occurred between the electronic device and another electronic devices (e.g., a Wi-Fi modem, BLUETOOTH® receiver, geo location device, or the like) without requiring the person's knowledge or active participation.
- another electronic devices e.g., a Wi-Fi modem, BLUETOOTH® receiver, geo location device, or the like
- three or more inputs are used to provide the desired authentication for purposes of authorizing the person (e.g., to gain entry to the building or property).
- the various inputs may include two or more biometric identifiers and an identification of a single electronic device, identification of multiple electronic devices and one or more biometric identifiers, confirmation of presence along with one or more biometric identifiers and identification of at least one electronic device, or some other combination.
- authentication module 215 may operate through a series of steps or methods that may be arranged in the priority of most likely to authenticate to least likely to authenticate. If higher priority methods or steps are unavailable, the system may automatically move to the next step, and so forth. For example, if a facial recognition scan is not available due to the person wearing sunglasses or there being improper lighting, the system may automatically listen for a voice sample or request a voice response from the person. The order in which the various steps are taken may be based at least in part on what is easiest for the person (i.e., requires the least amount of effort and/or participation) to gain access to the building or property (e.g., what requires the least amount of effort to what requires the most amount of effort).
- Operation of authentication module 215 may include an override feature.
- authentication module 215 may, in a standard state or mode, automatically obtain the necessary biometric identifiers and identification of electronic devices.
- a person may opt out of the standard mode, for example, by issuing a voice command.
- the voice command may include, for example, specific key words that authenticate the user.
- the voice command may also provide a voice sample for purposes of providing a secondary authentication of the user.
- confirming authentication via one of the biometric identifiers and/or identification of at least one electronic device prompts scanning or activation of other components for obtaining the other of the biometric identifier and device identification.
- identifying an electronic device may result in activation of a camera, scanner, sensor, or the like to obtain the biometric identifiers.
- the biometric identifiers and identification of an electronic device may occur concurrently.
- Authenticating the person may include comparing the collected biometric identifiers to stored biometric information, and/or comparing the information received about the person's electronic device to stored device information. These comparisons may be conducted by the entry apparatus 205 and/or another device such as, for example, local computing devices 115 , 120 , control panel 135 , or remote computing device 140 .
- the stored information may be stored on any one of the entry apparatus 205 , local computing devices 115 , 120 , control panel 135 , or remote computing device 140 , or accessible via one or more of such devices.
- the stored information may be in the form of user profiles.
- the stored information may be configured as one or more databases.
- the entry apparatus 205 may include, for example, a doorbell for the building or property.
- the doorbell may include a camera, scanner, microphone, speakers, and other components that assist in obtaining/receiving biometric identifiers, identifying an electronic device, and/or identifying presence of the person.
- the transmitter module 220 may transmit the one or more signals received from other components of the entry apparatus 205 .
- the transmitter module 220 may transmit data related to biometric identifiers, electronic device identification, and/or presence of one or more persons.
- the transmitter module 220 may be located with the receiver module 210 in a transceiver module.
- FIG. 3 shows a block diagram 300 of an entry apparatus 205 - a for use in wireless communication, in accordance with various examples.
- the entry apparatus 205 - a may be an example of one or more aspects of a local computing device 115 , 120 , a remote computing device 140 , or a control panel 135 described with reference to FIG. 1 .
- the entry apparatus 205 - a may also be an example of an entry apparatus 205 described with reference to FIG. 2 .
- the entry apparatus 205 - a may include a receiver module 210 - a , an authentication module 215 - a , and/or a transmitter module 220 - a , which may be examples of the corresponding modules of entry apparatus 205 .
- the entry apparatus 205 - a may also include a processor. Each of these components may be in communication with each other.
- the authentication module 215 - a may include a biometrics module 305 , a device identification module 310 , and a presence module 315 .
- the receiver module 210 - a and the transmitter module 220 - a may perform the functions of the receiver module 210 and the transmitter module 220 , of FIG. 2 , respectively.
- the biometrics module 305 may operate to perform at least some of the steps and functions described above with respect to FIG. 2 related to collected and evaluating biometric identifiers.
- Biometrics module 305 may operate to obtain biometric identifiers either actively or passively. In an active method, biometrics module 305 may automatically obtain biometric identifiers via, for example, a facial recognition scan, a voice sample, or a retina scan. In a passive mode, biometrics module 305 may obtain biometric identifiers in response to a user's actions such as, for example, a spoken voice command, touching a scanning surface with a finger or hand to provide a fingerprint/handprint, or providing some other unique biometric information.
- Biometrics module 305 may operate to evaluate the received biometric information.
- the evaluation may include processing such as conducting a look-up in databases having stored biometric information (e.g., a database of user profiles that include biometric information).
- the evaluating may include comparison of the obtained biometric information to stored biometric information.
- the evaluating may include determining whether the received biometric information is of sufficient quality or in other ways meets threshold standards in order to be compared to stored biometric information.
- biometrics module 305 may submit a request to the person for resubmission of the biometric information.
- Biometrics module 305 may generate a prompt for the person to enter biometric information. For example, biometrics module 305 may generate a light pattern, a text message, or audible message that is conveyed via the entry apparatus 205 - a . In other examples, biometrics module 305 may deliver a message to the electronic device carried by the person to provide instructions to or otherwise prompt the person to submit biometric information or position themselves in a manner in which the biometric information may be obtained by authentication module 215 - a.
- Device identification module 310 may operate to perform the steps and functions discussed above related to identifying one or more devices associated with the person seeking to obtain access to the building or property.
- Device identification module 310 may identify one or more electronic devices (e.g., a mobile computing device such as a smartphone) associated with a person.
- the device may be carried by the person or located in relative close proximity to the person and/or an entry to the building or property.
- the device is associated with a vehicle such as an automobile, motorcycle, scooter, or the like.
- the device is a mobile computing device such as a smartphone, an identification (ID) fob, bracelet, key card, or the like.
- the device may transmit an electric signal that is identified by device identification module 310 .
- device identification module 310 may communicate with the electronic device in other ways (e.g., transmit a text message, email, voice message, a location ping, or the like to the device). As discussed above, device identification module 310 may implement various technologies to identify the device. The technologies may cooperate with other electronic devices of the building or property such as a control panel, modem, transceiver, or the like in addition to or in place of components associated with entry apparatus 205 - a.
- Presence module 315 may operate as discussed above to provide steps or methods of detecting the presence of a person approaching or in close proximity to an entry of the building or property (e.g., adjacent to entry apparatus 205 - a ). Presence module 315 may cooperate with components or other features used to operate biometrics module 305 and/or device identification module 310 . Presence module 315 may confirm presence of a person concurrently with collecting other information such as biometric identifiers and/or device identification. For example, presence module 315 may confirm presence of a person by detecting a voice, and the detected voice may be used as a voice sample that is used as a biometrics identifier for the person.
- FIG. 4 shows a system 400 for use in authentication systems, such as authentication systems used to control access to a building or property, in accordance with various examples.
- System 400 may include an entry apparatus 205 - b , which may be an example of the local computing device 115 , 120 , remote computing device 140 , or control panel 135 of FIG. 1 .
- Entry apparatus 205 - b may also be an example of one or more aspects of entry apparatus 205 and/or 205 - a of FIGS. 2 and 3 .
- Entry apparatus 205 - b may include authentication module 215 - b , which may be an example authentication module 215 described with reference to FIGS. 2 and 3 .
- Authentication module 215 - b may include an access module 445 .
- the authentication module 215 - b may additionally include the biometrics module 305 , a device identification module 310 , and a presence module 315 .
- Entry apparatus 205 - b may also include components for bi-directional voice and data communications including components for transmitting communications and components for receiving communications.
- entry apparatus 205 - b may communicate bi-directionally with one or more of local computing device 115 - a , one or more sensors 150 - a , remote storage 450 , and/or remote server 455 , which may be an example of the remote server of FIG. 1 .
- This bi-directional communication may be direct (e.g., entry apparatus 205 - b communicating directly with remote storage 450 ) or indirect (e.g., entry apparatus 205 - b communicating indirectly with remote server 455 through remote storage 450 ).
- the access module 445 may operate to control access to the building or property in response to the authentication determined by one or more of the biometrics module 305 , a device identification module 310 , and a presence module 315 described with reference to FIG. 3 .
- access module 445 may generate signals, instructions or the like for use by a locking device, latch, or opening mechanism that controls a barrier such as a door that provides access to the building or property.
- Access module 445 may receive instructions from other components or modules such as one of the biometrics module 305 , device identification module 310 , or presence module 315 of the authentication module 215 - a described above with reference to FIG. 3 .
- access module 445 maintains the barrier in a closed and/or locked state until the person is authenticated as an authorized person for access into the building or property.
- Access module 445 may also provide instructions or signals for operating other components of a security and/or automation system. For example, access module 445 may disarm a security feature, activate lighting, operate an HVAC system, or the like. Access module 445 may operate automatically to provide unlocking and/or opening of the barrier without the use of a key, and, in some circumstances, without the person touching the barrier.
- local computing device 115 - a may be controlled at least in part by access module 445 .
- local computing device 115 - a may be a door lock or a door opening device.
- Entry apparatus 205 - b may also include a processor module 405 , and memory 410 (including software/firmware code (SW) 415 ), an input/output controller module 420 , a user interface module 425 , a transceiver module 430 , and one or more antennas 435 each of which may communicate—directly or indirectly—with one another (e.g., via one or more buses 440 ).
- the transceiver module 430 may communicate bi-directionally—via the one or more antennas 435 , wired links, and/or wireless links—with one or more networks or remote devices as described above.
- the transceiver module 430 may communicate bi-directionally with one or more of local computing device 115 - a , remote storage 450 , and/or remote server 455 .
- the transceiver module 430 may include a modem to modulate the packets and provide the modulated packets to the one or more antennas 435 for transmission, and to demodulate packets received from the one or more antenna 435 . While a control panel or a control device (e.g., entry apparatus 205 - b ) may include a single antenna 435 , the control panel or the control device may also have multiple antennas 435 capable of concurrently transmitting or receiving multiple wired and/or wireless transmissions.
- a control panel or a control device e.g., entry apparatus 205 - b
- the control panel or the control device may also have multiple antennas 435 capable of concurrently transmitting or receiving multiple wired and/or wireless transmissions.
- one element of entry apparatus 205 - b may provide a direct connection to a remote server 455 via a direct network link to the Internet via a POP (point of presence).
- one element of entry apparatus 205 - b may provide a connection using wireless techniques, including digital cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection, and/or another connection.
- CDPD Cellular Digital Packet Data
- the signals associated with system 400 may include wireless communication signals such as radio frequency, electromagnetics, local area network (LAN), wide area network (WAN), virtual private network (VPN), wireless network (using 802.11, for example), 345 MHz, Z-WAVE®, cellular network (using 3G and/or LTE, for example), and/or other signals.
- the one or more antennas 435 and/or transceiver module 430 may include or be related to, but are not limited to, WWAN (GSM, CDMA, and WCDMA), WLAN (including BLUETOOTH® and Wi-Fi), WMAN (WiMAX), antennas for mobile communications, antennas for Wireless Personal Area Network (WPAN) applications (including RFID and UWB).
- each antenna 435 may receive signals or information specific and/or exclusive to itself. In other embodiments, each antenna 435 may receive signals or information not specific or exclusive to itself.
- one or more sensors 150 - a may connect to some element of system 400 via a network using one or more wired and/or wireless connections.
- the sensors 150 - a may collect information that is used for determining a biometric identifier such as at least one of facial recognition, voice recognition, thumbprint, fingerprint, palm print, and retina scan.
- the sensors 150 - a may be used to identify an electronic device associated with a person seeking to gain access to the building or property.
- the sensors 150 - a may be configured to detect at least one of WiFi, radio frequency identification (RFID), geo location, and BLUETOOTH® signals, or otherwise communicate with one or more electronic devices using such technologies.
- RFID radio frequency identification
- the user interface module 425 may include an audio device, such as an external speaker system, an external display device such as a display screen, and/or an input device (e.g., remote control device interfaced with the user interface module 425 directly and/or through I/O controller module 420 ).
- the user interface module 425 may be located at an entry to a building or property.
- the user interface module 425 may facilitate some communications between a person and the communication system 400 .
- user interface 425 may communicate an audio signal to a person to look into or toward entry apparatus 205 - b so the authentication module 215 - b can more accurately obtain a biometric identifier.
- a message is displayed for the person via a display screen of user interface 425 .
- the displayed message may include instructions, pose questions, or present images as part of communicating with the person.
- One or more buses 440 may allow data communication between one or more elements of entry apparatus 205 - b (e.g., processor module 405 , memory 410 , I/O controller module 420 , user interface module 425 , etc.).
- elements of entry apparatus 205 - b e.g., processor module 405 , memory 410 , I/O controller module 420 , user interface module 425 , etc.
- the memory 410 may include random access memory (RAM), read only memory (ROM), flash RAM, and/or other types.
- the memory 410 may store computer-readable, computer-executable software/firmware code 415 including instructions that, when executed, cause the processor module 405 to perform various functions described in this disclosure (e.g., detect a presence of at least one person positioned proximate an entry to the building or property, collect one or more biometric identifiers from the person, identify one or more devices within a predetermined proximity of the entry to the building, and/or grant the person access to the building based at least in part on the collected biometric identifiers and/or the identified devices, etc.).
- various functions described in this disclosure e.g., detect a presence of at least one person positioned proximate an entry to the building or property, collect one or more biometric identifiers from the person, identify one or more devices within a predetermined proximity of the entry to the building, and/or grant the person access to the building based at least in part on
- the software/firmware code 415 may not be directly executable by the processor module 405 but may cause a computer (e.g., when compiled and executed) to perform functions described herein.
- the computer-readable, computer-executable software/firmware code 415 may not be directly executable by the processor module 405 but may be configured to cause a computer (e.g., when compiled and executed) to perform functions described herein.
- the processor module 405 may include an intelligent hardware device, e.g., a central processing unit (CPU), a microcontroller, an application-specific integrated circuit (ASIC), etc.
- the processor module 405 may include, among other things, an intelligent hardware device (e.g., a central processing unit (CPU), a microcontroller, and/or an ASIC, etc.).
- the memory 410 can contain, among other things, the Basic Input-Output system (BIOS) which may control basic hardware and/or software operation such as the interaction with peripheral components or devices.
- BIOS Basic Input-Output system
- the authentication module 215 - b to implement the present systems and methods may be stored within the system memory 410 .
- Applications resident with system 400 are generally stored on and accessed via a non-transitory computer readable medium, such as a hard disk drive or other storage medium. Additionally, applications can be in the form of electronic signals modulated in accordance with the application and data communication technology when accessed via a network interface (e.g., transceiver module 430 , one or more antennas 435 , etc.).
- a network interface e.g., transceiver module 430 , one or more antenna
- Many other devices and/or subsystems may be connected to one or may be included as one or more elements of system 400 (e.g., entertainment system, computing device, remote cameras, wireless key fob, wall mounted user interface device, cell radio module, battery, alarm siren, door lock, lighting system, thermostat, home appliance monitor, utility equipment monitor, and so on).
- all of the elements shown in FIG. 4 need not be present to practice the present systems and methods.
- the devices and subsystems can be interconnected in different ways from that shown in FIG. 4 .
- an aspect of some operation of a system such as that shown in FIG. 4 , may be readily known in the art and are not discussed in detail in this application.
- Code to implement the present disclosure can be stored in a non-transitory computer-readable medium such as one or more of system memory 410 or other memory.
- the operating system provided on I/O controller module 420 may be iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®, UNIX®, LINUX®, or another known operating system.
- the transceiver module 430 may include a modem configured to modulate the packets and provide the modulated packets to the antennas 435 for transmission and/or to demodulate packets received from the antennas 435 . While the local computing devices 115 - a may include a single antenna 435 , the local computing devices 115 - a may have multiple antennas 435 capable of concurrently transmitting and/or receiving multiple wireless transmissions.
- FIG. 5 illustrates an apparatus or system 500 .
- the system 500 includes a control panel 135 , an entry apparatus 205 , a camera 505 , and a scanner/receiver 510 , which may all communicate with each other via network 125 .
- the control panel 135 may be one example of the control panel 135 described with reference to FIG. 1 .
- the entry apparatus 205 may be one example of the entry apparatus 205 described with reference to FIGS. 2-4 .
- the network 125 may be one example of the network 125 described with reference to FIG. 1 .
- Entry apparatus 205 may operate authentication module 215 .
- the authentication module 215 may be one example of the authentication module 215 described above with reference to FIGS. 2-5 .
- entry apparatus 205 alone or in combination with camera 505 and scanner/receiver 510 , may obtain biometric identifiers and/or identify a device associated with a person.
- camera 505 performs facial recognition based on images or video footage of a person wishing to gain access to a building or property.
- Scanner/receiver 510 may obtain other types of biometric information such as, for example, a fingerprint, a voice command or voice sample, or a retinal scan.
- scanner/receiver 510 may operate to detect an electronic device carried by or otherwise associated with a person from whom the biometric information is collected.
- One or both of camera 505 and scanner/receiver 510 may operate to detect presence of a person approaching or in close proximity to an entry of the building or property (e.g., in close proximity to entry apparatus 205 ).
- the biometric information, device identification information, and/or presence information may be transmitted to authentication module 215 .
- Authentication module 215 may operate, for example, to authenticate the person as someone who is authorized to gain access to the building or property.
- Authentication module 215 may communicate information to control panel 135 .
- Control panel 135 may conduct at least some of the processing of data (e.g., biometric identifier and the like).
- control panel 135 may facilitate identification of the electronic device associated with the person via, for example, an RFID transceiver, a geo location tracking device, or a BLUETOOTH® transceiver associated with or controlled by control panel 135 . In such cases, control panel 135 may communicate device identification information to authentication module 215 for use in authenticating the person.
- control panel 135 may include memory or other data storage capability to store user profiles, known biometric identifiers and/or electronic device identification information.
- Authentication module 215 may reference the stored information on control panel 135 as part of the authenticating the person.
- authentication module 215 may provide authorization for a person to gain access to the building or property.
- FIG. 6 illustrates another example device or system 600 for authenticating a person attempting to gain access to a building or property and/or provide keyless entry to a building or property.
- System 600 includes an entry apparatus 205 - c that includes an authentication module 215 , an access module 445 , a camera 550 , and a scanner/receiver 510 .
- System 600 may also include a control panel 135 and an access device 605 .
- the components of system 600 may communicate with each other via network 125 .
- the control panel 135 may be one example of the control panel 135 described with reference to FIG. 1 .
- the entry apparatus 205 - c may be one example of the entry apparatus 205 described with reference to FIGS. 2-4 .
- the authentication module 215 may be one example of the authentication module described with reference to FIGS. 2-5 .
- the access module may be one example of the access module 445 described with reference to FIG. 4 .
- the camera 550 and scanner/receiver 510 may be examples of the camera 550 and scanner/receiver 510 described with reference to FIG. 5 .
- the network 125 may be one example of the network 125 described with reference to FIG. 1 .
- Entry apparatus 205 - c may include each of the authentication modules 215 , access module 445 , camera 505 , and scanner/receiver 510 in a single housing.
- the components of entry apparatus 205 - c may be arranged in a common housing.
- the entry apparatus 205 - c may be positioned proximate an entry point to a building or property.
- entry apparatus 205 - c may include a doorbell, user interface, speaker, microphone, or the like.
- access device 605 may also be included in the housing of entry apparatus 205 - c .
- Camera 505 and scanner/receiver 510 may communicate directly with each other and the authentication module 215 and access module 445 .
- Camera 505 and scanner/receiver 510 may individually, or in combination, obtain at least one biometric identifier and information about an electronic device associated with a person.
- the information collected by camera 505 and scanner/receiver 510 may be used to determine presence of one or more persons separately or in association with collecting the biometric identifiers and/or identification of a device.
- Authentication module 215 may operate to authenticate the person. Once the person is authenticated, authentication module 215 may provide instructions via access module 445 to permit the person to gain access to the building or property. Access module 445 may communicate with access device 605 to provide the desired access. The amount of access and other rights provided to the person may be based at least in part on a stored profile and associated instructions. Such profiles and other information may be stored on, for example, control panel 135 . Control panel 135 may provide other features and functionality as described above with reference to, for example, FIGS. 1, 4, and 5 .
- FIG. 7 illustrates a system 700 and associated devices and components for carrying out at least some aspects of the present disclosure.
- System 700 includes an entry apparatus 205 - d , a control panel 135 , and an access device 605 .
- the entry apparatus 205 - d may be one example of the entry apparatus 205 described above with reference to FIGS. 2-6 .
- Control panel 135 may be one example of the control panel 135 described above with reference to at least FIGS. 1, 5, and 6 .
- Access device 605 may be one example of the access device 605 described above with reference to FIG. 6 .
- System 700 includes entry apparatus 205 - d determining presence of a person at block 705 . Determining presence of a person may include distinguishing between various types of objects, movements, and the like. Presence data 710 is transmitted to control panel 135 . Entry apparatus 205 - d also collects at least one biometric identifier at block 715 . The one or more biometric identifiers may include at least one of facial recognition, voice recognition, thumbprint, fingerprint, palm print, and retina scan. Biometric data 720 is also transferred to control panel 135 . Entry apparatus 205 - d may identify at least one device at block 725 . Identification data 730 is transmitted to control panel 135 . Control panel 135 may authenticate a person and generate access instructions at block 735 .
- Access instruction 740 are transmitted to access device 605 .
- Access device 605 may provide access to a building or property at block 745 .
- Providing access may include, for example, unlocking a barrier (e.g., door), opening a barrier, disarming a securing feature, or the like.
- FIG. 8 illustrates a system 800 including entry apparatus 205 - d , control panel 135 , and access device 605 .
- Entry apparatus 205 - d may be one example of the entry apparatus 205 described above with reference to FIGS. 2-6 .
- Control panel 135 may be one example of the control panel 135 described with reference to FIGS. 1, 5 and 6 .
- Access device 605 may be one example of the access device 605 described with reference to FIG. 6 .
- System 800 includes entry apparatus 205 - d detecting a device (e.g., electronic device associated with a person) at block 805 .
- Device data 810 is transmitted to control panel 135 .
- Entry apparatus 205 - d may collect biometric information at block 815 .
- Biometric information 820 is transferred to control panel 135 .
- Control panel 135 confirms a match of biometric information with stored information at block 825 .
- Control panel 135 generates access instructions at block 830 .
- Access instructions 835 are delivered to access device 605 .
- Access device 605 provides access to the building or property at block 840 .
- FIG. 9 illustrates another system 900 that includes entry apparatus 205 - d , control panel 135 , and access device 605 .
- Entry apparatus 205 - d may be one example of the entry apparatus 205 described with reference to FIGS. 2-6 .
- Control panel 135 may be one example of the control panel 135 described with reference to FIGS. 1, 5 and 6 .
- Access device 605 may be one example of the access device 605 described with reference to FIG. 6 .
- System 900 includes collecting facial recognition data of a person at block 905 by entry apparatus 205 - d .
- Facial recognition data 910 is delivered to control panel 135 .
- Control panel 135 confirms facial recognition data matches stored data at block 915 .
- Entry apparatus 205 - d may detect a device carried by the person at block 920 .
- Device data 925 is delivered to control panel 135 .
- Control panel 135 confirms that the device correlates with the identified person at block 930 .
- Control panel 135 grants access to a person at block 935 .
- Access instructions 940 are delivered to access device 605 , which provides access to a building or property at block 945 .
- the facial recognition data may be collected using a camera or other device associated with entry apparatus 205 - d .
- the electronic device of the person may be detected using various technologies, some of which are operated using entry apparatus 205 - d , wherein other technologies operate at least in part with other devices or components associated with the building or property. Although various functions are shown being conducted by control panel 135 in FIG. 9 , at least some of those functions may be conducted at least in part by entry apparatus 205 - d.
- FIG. 10 illustrates a system 1000 that includes an entry apparatus 205 - d and access device 605 .
- Entry apparatus 205 - d may be one example of the entry apparatus 205 described above with reference to FIGS. 2-6 .
- Access device 605 may be one example of the access device 605 described with reference to FIG. 6 .
- Entry apparatus 205 - d may operate to determine presence of a person at block 1005 .
- Entry apparatus 205 - d may collect biometric identifiers at block 1010 .
- Entry apparatus 205 - d may identify a device, such as an electronic device carried by the person to which the biometric identifiers relate at a block 1015 .
- Entry apparatus 205 - d may authenticate the person at block 1020 using, for example, the collected biometric identifiers and the identified device.
- Entry apparatus 205 - d generates access instructions at block 1025 .
- Access instructions 1030 are delivered to access device 605 .
- Access device 605 provides access to the building or property at block 1035 .
- any of the functions described with reference to blocks 1005 , 1010 , 1015 , 1020 , 1025 may be performed at least in part on another device or component of system 1000 (e.g., a control panel or local computing device).
- FIG. 11 is a flow chart illustrating an example of a method 1100 for controlling access to a building associated with a security and/or automation system, in accordance with various aspects of the present disclosure.
- the method 1100 is described below with reference to aspects of one or more of the systems described with reference to FIGS. 1 and 4-10 , and/or aspects of one or more of the apparatuses or devices described with reference to FIGS. 1-10 .
- a computing device such as the entry apparatus 205 of FIGS. 2-10 may execute one or more sets of codes to control the functional elements of the authentication module 215 of FIGS. 2-6 to perform the functions described below. Additionally or alternatively, the entry apparatus 205 may perform one or more of the functions described below using special-purpose hardware.
- the method 1100 may include detecting presence of at least one person positioned proximate an entry to the building.
- Block 1110 includes collecting one or more biometric identifiers from the person.
- Block 1115 includes identifying one or more devices within a predetermined proximity of the entry to the building.
- Block 1120 includes granting the person access to the building based at least in part on the collecting and identifying of steps of blocks 1110 and 1115 .
- the operation(s) at block 1105 may be performed using the authentication module 215 described with reference to FIGS. 2-6 .
- the method 1100 may provide for authentication of persons seeking access to a building or property.
- the method 1100 may provide for hands free or keyless entry to a building or property.
- the method 1100 may relate to operation of automation/security systems or components thereof. It should be noted that the method 1100 is just one implementation and that the operations of the method 1100 may be rearranged or otherwise modified such that other implementations are possible.
- FIG. 12 is a flow chart illustrating an example of a method 1200 for controlling access to a building associated with a security and/or automation system, in accordance with various aspects of the present disclosure.
- the method 1200 is described below with reference to aspects of one or more of the systems described with reference to FIGS. 1 and 4-10 , and/or aspects of one or more of the apparatuses or devices described with reference to FIGS. 1-10 .
- a computing device such as the entry apparatus 205 of FIGS. 2-10 may execute one or more sets of codes to control the functional elements of the authentication module 215 of FIGS. 2-6 to perform the functions described below. Additionally or alternatively, the entry apparatus 205 may perform one or more of the functions described below using special-purpose hardware.
- the method 1200 may include collecting one or more biometric identifiers from a person positioned at an entry to the building.
- Block 1210 includes identifying one or more devices that are associated with the person.
- Block 1215 includes granting the person access to the building based at least in part on the collected one or more biometric identifiers and the identified one or more devices.
- Block 1220 includes creating a user profile, wherein the profile comprises at least one biometric identifier and information about at least one device.
- Block 1225 includes searching a user profile data base based at least in part on the collected biometric identifiers and the identified devices.
- Block 1230 includes determining a level of access to the building based at least in part on a user profile that matches the collected biometric identifiers and the identified devices.
- the operation(s) at block 1205 may be performed using the authentication module 215 described with reference to FIGS. 2-6 .
- the method 1200 may provide for authentication of persons seeking access to a building or property.
- the method 1200 may provide for hands free or keyless entry to a building or property.
- the method 1200 may related to operation of automation/security systems or components thereof. It should be noted that the method 1200 is just one implementation and that the operations of the method 1200 may be rearranged or otherwise modified such that other implementations are possible.
- aspects from two or more of the methods 1100 , 1200 may be combined and/or separated. It should be noted that the methods 1100 , 1200 are just example implementations, and that the operations of the methods 1100 , 1200 may be rearranged or otherwise modified such that other implementations are possible.
- Information and signals may be represented using any of a variety of different technologies and techniques.
- data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
- a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, and/or state machine.
- a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, and/or any other such configuration.
- the functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the disclosure and appended claims. For example, due to the nature of software, functions described above can be implemented using software executed by a processor, hardware, firmware, hardwiring, or combinations of any of these. Features implementing functions may also be physically located at various positions, including being distributed such that portions of functions are implemented at different physical locations.
- the term “and/or,” when used in a list of two or more items, means that any one of the listed items can be employed by itself, or any combination of two or more of the listed items can be employed.
- the composition can contain A alone; B alone; C alone; A and B in combination; A and C in combination; B and C in combination; or A, B, and C in combination.
- “or” as used in a list of items indicates a disjunctive list such that, for example, a list of “at least one of A, B, or C” means A or B or C or AB or AC or BC or ABC (i.e., A and B and C).
- any disclosure of components contained within other components or separate from other components should be considered exemplary because multiple other architectures may potentially be implemented to achieve the same functionality, including incorporating all, most, and/or some elements as part of one or more unitary structures and/or separate structures.
- Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage medium may be any available medium that can be accessed by a general purpose or special purpose computer.
- computer-readable media can comprise RAM, ROM, EEPROM, flash memory, CD-ROM, DVD, or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor.
- any connection is properly termed a computer-readable medium.
- Disk and disc include compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
- This disclosure may specifically apply to security system applications.
- This disclosure may specifically apply to automation system applications.
- the concepts, the technical descriptions, the features, the methods, the ideas, and/or the descriptions may specifically apply to security and/or automation system applications. Distinct advantages of such systems for these specific applications are apparent from this disclosure.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/232,720 US10854028B2 (en) | 2016-08-09 | 2016-08-09 | Authentication for keyless building entry |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/232,720 US10854028B2 (en) | 2016-08-09 | 2016-08-09 | Authentication for keyless building entry |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180047227A1 US20180047227A1 (en) | 2018-02-15 |
US10854028B2 true US10854028B2 (en) | 2020-12-01 |
Family
ID=61160277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/232,720 Active US10854028B2 (en) | 2016-08-09 | 2016-08-09 | Authentication for keyless building entry |
Country Status (1)
Country | Link |
---|---|
US (1) | US10854028B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11810413B1 (en) * | 2022-06-28 | 2023-11-07 | United Services Automobile Association (Usaa) | Systems and methods for managing individual enrollment data |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11055942B2 (en) | 2017-08-01 | 2021-07-06 | The Chamberlain Group, Inc. | System and method for facilitating access to a secured area |
WO2019028039A1 (en) * | 2017-08-01 | 2019-02-07 | The Chamberlain Group, Inc. | System for facilitating access to a secured area |
US10757097B2 (en) * | 2017-08-28 | 2020-08-25 | T-Mobile Usa, Inc. | Temporal identity vaulting |
EP3561789A1 (en) * | 2018-04-24 | 2019-10-30 | Carrier Corporation | Improved home security system with automatic authorization functionality |
FR3082009B1 (en) * | 2018-05-31 | 2020-10-30 | E38 | SYSTEM AND PROCEDURE FOR MANAGEMENT AND GEOLOCATION OF GOODS AND PEOPLE IN A BUILDING. |
US10810816B1 (en) * | 2018-08-28 | 2020-10-20 | Robert William Kocher | Information-based, biometric, asynchronous access control system |
JP7115551B2 (en) * | 2018-10-12 | 2022-08-09 | 日本電気株式会社 | Apparatus, method and program |
WO2020106391A1 (en) * | 2018-11-21 | 2020-05-28 | Carrier Corporation | A system of seamless automated customer id verification at the hotel entrance and releasing the hotel room key |
JP6781413B2 (en) * | 2018-11-21 | 2020-11-04 | 日本電気株式会社 | Information processing device |
GB201819429D0 (en) * | 2018-11-29 | 2019-01-16 | Holovis International Ltd | Apparatus and method |
CN113646751B (en) * | 2019-04-01 | 2024-05-28 | 宜日网络有限公司 | Communication system, information providing device, program, and information providing method |
EP3739553A1 (en) * | 2019-05-11 | 2020-11-18 | Ekinno Lab Sp. z o.o. | A method and system for access control |
US11004282B1 (en) * | 2020-04-02 | 2021-05-11 | Swiftlane, Inc. | Two-factor authentication system |
US20210390810A1 (en) * | 2020-06-11 | 2021-12-16 | Carrier Corporation | Biometric enabled access control |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040155771A1 (en) * | 1999-04-07 | 2004-08-12 | The Chamberlain Group, Inc. | Movable barrier operator having serial data communication |
US6992562B2 (en) | 2003-06-10 | 2006-01-31 | Visteon Global Technologies, Inc. | Biometric keyless entry system |
US7110744B2 (en) | 1999-09-02 | 2006-09-19 | Automated Business Companies | Communication and proximity authorization systems |
US20070252001A1 (en) | 2006-04-25 | 2007-11-01 | Kail Kevin J | Access control system with RFID and biometric facial recognition |
US20080028230A1 (en) | 2006-05-05 | 2008-01-31 | Tri-D Systems, Inc. | Biometric authentication proximity card |
US20080120195A1 (en) * | 2006-11-21 | 2008-05-22 | Shakkarwar Rajesh G | Systems and methods for identification and authentication of a user |
US20150169864A1 (en) * | 2013-12-13 | 2015-06-18 | Aerohive Networks, Inc. | Systems and methods for user-based network onboarding |
US20150228134A1 (en) * | 2014-02-12 | 2015-08-13 | Viking Access Systems, Llc | Movable barrier operator configured for remote actuation |
US20160277380A1 (en) * | 2015-03-17 | 2016-09-22 | Kim Wagner | Multi-device transaction verification |
US20170134698A1 (en) * | 2015-11-11 | 2017-05-11 | Vivint, Inc | Video composite techniques |
US20170163750A1 (en) * | 2015-12-04 | 2017-06-08 | At&T Intellectual Property I, L.P. | Method and apparatus for modifying behavior of a user via a network |
US20170245124A1 (en) * | 2016-02-18 | 2017-08-24 | Vivint, Inc. | Event triggered messaging |
-
2016
- 2016-08-09 US US15/232,720 patent/US10854028B2/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040155771A1 (en) * | 1999-04-07 | 2004-08-12 | The Chamberlain Group, Inc. | Movable barrier operator having serial data communication |
US7110744B2 (en) | 1999-09-02 | 2006-09-19 | Automated Business Companies | Communication and proximity authorization systems |
US6992562B2 (en) | 2003-06-10 | 2006-01-31 | Visteon Global Technologies, Inc. | Biometric keyless entry system |
US20070252001A1 (en) | 2006-04-25 | 2007-11-01 | Kail Kevin J | Access control system with RFID and biometric facial recognition |
US20080028230A1 (en) | 2006-05-05 | 2008-01-31 | Tri-D Systems, Inc. | Biometric authentication proximity card |
US20080120195A1 (en) * | 2006-11-21 | 2008-05-22 | Shakkarwar Rajesh G | Systems and methods for identification and authentication of a user |
US20150169864A1 (en) * | 2013-12-13 | 2015-06-18 | Aerohive Networks, Inc. | Systems and methods for user-based network onboarding |
US20150228134A1 (en) * | 2014-02-12 | 2015-08-13 | Viking Access Systems, Llc | Movable barrier operator configured for remote actuation |
US20160277380A1 (en) * | 2015-03-17 | 2016-09-22 | Kim Wagner | Multi-device transaction verification |
US20170134698A1 (en) * | 2015-11-11 | 2017-05-11 | Vivint, Inc | Video composite techniques |
US20170163750A1 (en) * | 2015-12-04 | 2017-06-08 | At&T Intellectual Property I, L.P. | Method and apparatus for modifying behavior of a user via a network |
US20170245124A1 (en) * | 2016-02-18 | 2017-08-24 | Vivint, Inc. | Event triggered messaging |
Non-Patent Citations (1)
Title |
---|
Ringdale, Networked Building Access Control and Home Automation Systems, available at least as early as Dec. 23, 2008. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11810413B1 (en) * | 2022-06-28 | 2023-11-07 | United Services Automobile Association (Usaa) | Systems and methods for managing individual enrollment data |
Also Published As
Publication number | Publication date |
---|---|
US20180047227A1 (en) | 2018-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10854028B2 (en) | Authentication for keyless building entry | |
US10970952B2 (en) | User identification system | |
US9344436B1 (en) | Proximity-based and user-based access control using wearable devices | |
US11284264B2 (en) | Shareable device use based on user identifiable information | |
KR101977845B1 (en) | Mobile device to provide continuous and discrete user authentication | |
US9972195B2 (en) | False alarm reduction | |
US9183683B2 (en) | Method and system for access to secure resources | |
US10142332B2 (en) | Method and apparatus for a wearable based authentication for improved user experience | |
US10493955B1 (en) | Internet of vehicles system performing connection authentication through a public network and connection method | |
US11140239B2 (en) | End a shareable device interactive session based on user intent | |
US11361060B1 (en) | Home automation system supporting dual-authentication | |
KR20170080589A (en) | Distributing biometric authentication between devices in an ad hoc network | |
US9972146B1 (en) | Security system with a wireless security device | |
US20190193677A1 (en) | Distribution device, rescue system, method of controlling distribution device, and recording medium | |
US10121295B2 (en) | System and method for accessing a vehicle | |
CN106274807A (en) | Automobile intelligent control method based on mobile terminal and device | |
KR101570463B1 (en) | Portable terminals and door locks are interlocked | |
US11019191B1 (en) | Claim a shareable device for personalized interactive session | |
US20210162948A1 (en) | Sharing system | |
CN112349009A (en) | User identity identification method, device, equipment and computer readable storage medium | |
US20170278363A1 (en) | Emergency doorbell communicator | |
KR20140093556A (en) | Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof | |
CN106535190A (en) | Network connection method and apparatus | |
CN114715075B (en) | Vehicle authentication system and method based on BLE and fingerprint modes | |
US11893842B2 (en) | Information processing apparatus, information processing method, computer-readable storage medium, and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VIVINT, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEAVERS, TIMOTHY RYAN;CARTER, JASON;MCCALLUM, DANIEL;AND OTHERS;SIGNING DATES FROM 20160523 TO 20160721;REEL/FRAME:039388/0544 |
|
AS | Assignment |
Owner name: BANK OF AMERICA N.A., NORTH CAROLINA Free format text: SUPPL. NO. 2 SECURITY AGREEMENT;ASSIGNOR:VIVINT, INC.;REEL/FRAME:047024/0048 Effective date: 20180906 Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNOR:VIVINT, INC.;REEL/FRAME:047029/0304 Effective date: 20180906 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, DELAWARE Free format text: SECURITY AGREEMENT;ASSIGNOR:VIVINT, INC.;REEL/FRAME:049283/0566 Effective date: 20190510 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: VIVINT, INC., UTAH Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:056832/0824 Effective date: 20210709 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |